CSE News

Visitors: Receive the department's Friday morning email message containing upcoming events, as well as news items posted on the web during the past week.   [Subscribe]

Oct 29, 2014
Rise of e-voting is inevitable, as is risk of hacking

As elections approach in both Canada and the US, more municipalities are considering the use of Internet voting or electronic voting machines. This article in the Globe and Mail describes some of the risks associated with this trend and references the work that was done during the last national election cycle when Prof. J. Alex Halderman and his students hacked the proposed Washington DC Internet voting system. [Full Story]


Related Topics:  Digital Democracy  Halderman, J. Alex  Security (Computing)  

Oct 29, 2014
New Jersey e-vote experiment after Sandy declared a disaster

This article in Aljazeera America details research into the security of electronic voting that was taken up in New Jersey following Hurricane Sandy. Prof. J. Alex Halderman is quoted in long form in the article. [Full Story]


Related Topics:  Digital Democracy  Halderman, J. Alex  Security (Computing)  

Oct 28, 2014
Winter 2015: Probabilistic Graphical Models for Vision and Beyond

Course No.: EECS 598-004
Credit Hours: 3 credits
Instructor: Jason Corso
Prerequisites: EECS 501 or graduate-level proficiency with probability and statistics

Course Description:
This course will cover probabilistic graphical models in detail starting from the basics and pushing through contemporary results. There will be an emphasis on driving problem formulations from computer vision but our coverage will be broad; connections to other application areas will be discussed when plausible. [More Info]

Oct 28, 2014
Winter 2015: Grid Integration of Alternative Energy Sources

Course No.: EECS 498-002
Credit Hours: 4 credits
Instructor: Johanna Mathieu
Prerequisites: EECS 215 or EECS 314 or permission of instructor

Course Description:
This course will present a variety of alternative energy sources, along with energy processing technologies that are required for power system connection. Topics will be covered at a level suited to establish a broad understanding of the various technologies, and of the associate system implications. [More Info]

Oct 28, 2014
Winter 2015: Control of Discrete Event Systems

Course No.: EECS 598-001
Credit Hours: 3 credits
Instructor: Stephane Lafortune
Prerequisites: EECS 566 or EECS 598-005 in Fall 2013 or permission of instructor

Course Description:
This course will cover advanced topics on control of discrete event systems, with focus on the following topics: distributed and decentralized control architectures; synthesis methodologies for controllers under safety and liveness properties; comparison of synthesis techniques for specifications described by automata and by temporal logics; joint control and diagnosis problems for fault-tolerant control; discussion of relevant case studies. [More Info]

Oct 28, 2014
Winter 2015: Information Retrieval and Web Search

Course No.: EECS 498-001
Credit Hours: 3 credits
Instructor: Rada Mihalcea
Prerequisites: EECS 281

Course Description:
This course will cover traditional material, as well as recent advances in Information Retrieval (IR), the study of indexing, processing, querying, and classifying data. [More Info]

Oct 22, 2014
Prof. Edwin Olson Receives NSF CyberSEES Award

Associate Professor Edwin Olson was recently awarded an NSF CyberSEES grant for his research project, Sustainably Unlocking Energy from Municipal Solid Waste Using a Sensor-Driven Cyber-Infrastructure Framework. The award aims to advance the science of sustainability in tandem with advances in computing and communication technologies. [Full Story]


Related Topics:  Olson, Edwin  Sustainability  

Oct 22, 2014
Prof. Satish Narayanasamy Receives Google Faculty Research Award

Satish Narayanasamy, associate professor of Computer Science and Engineering, has been awarded a 2014 Google Faculty Research Award for his work in software engineering. The Google Faculty Research Awards program is a competitive worldwide program intended to facilitate more interaction between Google and academia. [Full Story]


Related Topics:  Narayanasamy, Satish  

Oct 14, 2014
UM Computer Science Alumni Create Cribspot.com

Three former University of Michigan students are making a name for themselves in the growing Ann Arbor startup scene with cribspot.com. The startup helps college students find suitable places to live, while also helping landlords manage their properties. [Full Story]


Related Topics:  Alumni  

Oct 13, 2014
Armin Alaghi Awarded Rackham Predoctoral Fellowship

CSE graduate student Armin Alaghi received a Rackham Predoctoral Fellowship to support his research on scholastic computing. The fellowship is awarded to outstanding doctoral candidates in the final stages of their program who are unusually creative, ambitious and risk-taking. [Full Story]


Related Topics:  Graduate Students  

Oct 10, 2014
Life, Engineered: How Lynn Conway Reinvented Her World and Ours

Emerita professor Lynn Conway engineered her life from the start and reinvented the computer chip -- without her, our cell phones wouldn't be possible. But she also pioneered a potentially harder road, becoming among the first transgender woman in engineering. [Full Story]


Related Topics:  Conway, Lynn  Integrated Circuits and VLSI  

Oct 09, 2014
Prof. Valeria Bertacco Receives U-M Faculty Recognition Award

Prof. Valeria Bertacco has been selected to receive a Faculty Recognition Award by the Rackham Graduate School at the University of Michigan for her remarkable contributions to the University through achievements in scholarly research, and excellence as a teacher, advisor and mentor. [Full Story]


Related Topics:  Bertacco, Valeria  

Oct 08, 2014
UM Professor Named on of Brilliant 10 for Building Energy Scavenging Sensors

Prof. Prabal Dutta was interviewed on Michigan Radio's Stateside segment regarding his work on energy scavenging sensors, called smart dust, that won't need batteries to operate. Listen to the interview here. [Full Story]


Related Topics:  Dutta, Prabal  Internet of Things  Sensors  

Oct 06, 2014
Prof. Kevin Fu Answers Your Questions About Medical Device Security

in this Slashdot posting, Prof. Fu answers submitted questions about the security of medical devices, with subjects ranging from attack surfaces for drug-administering pumps to what to do if you've been the recipient of a hackable implant. [Full Story]

Oct 06, 2014
High School Girls Invited to Explore Computer Science

High school students: are you curious about opportunities in computer science? Girls Encoded is an exciting all-day event designed to educate and encourage girls to study computer science. [Full Story]

Oct 06, 2014
3 Lessons American Districts Can Learn From Foreign Schools

THE Journal reviews new approaches to learning that US K-12 schools are investigating, including work by Prof. Elliot Soloway into the use of smartphones as educational aids. Prof. Soloway has worked with schools in Singapore on an inquiry-based approach to learning that employs mobile technology, and he is now working to bring this same approach back to local schools. [Full Story]


Related Topics:  Soloway, Elliot  Technology for Education  

Oct 06, 2014
Jia Deng Receives 2014 Yahoo ACE Award

Prof. Jia Deng has been awarded a 2014 Yahoo ACE (Academic Career Enhancement) Award.The award is given to five top young professors at leading research universities around the world who are selected among promising first and second-year faculty members conducting Yahoo relevant academic research. [Full Story]


Related Topics:  Deng, Jia  

Sep 30, 2014
Jason Mars Selected as Program Chair for CGO 2015

Prof. Jason Mars has been selected to serve as Program Chair for the 2015 International Symposium on Code Generation and Optimization (CGO). CGO brings together researchers and practitioners working at the interface of hardware and software on a wide range of optimization and code generation techniques and related issues. [Full Story]


Related Topics:  Mars, Jason  

Sep 23, 2014
Ryan Wolcott Receives Best Student Paper Award at IROS 2014

Ryan Wolcott received a Best Student Paper Award at the 2014 IEEE/RSJ International Conferences on Intelligent Robot Systems. His paper focuses on one of the most significant roadblocks to autonomous vehicles, which is the prohibitive cost of sensor suites necessary for localization. [Full Story]


Related Topics:  Artificial Intelligence  Autonomous Vehicles   Graduate Students  

Sep 17, 2014
Prabal Dutta Named to Popular Science Brilliant Ten List

Professor Prabal Dutta has been named one of Popular Science's 2014 Brilliant Ten for his work in developing energy scavenging sensors that could help herald the Internet of Things. [Full Story]


Related Topics:  Dutta, Prabal  Internet of Things  Sensors  

Sep 11, 2014
David Chesney Receives IBM Faculty Award

Dr. David Chesney has been awarded a 2014 IBM Faculty Award for his work in teaching software engineering and for his success in encouraging students to leverage new approaches to developing assistive technologies for people with disabilities. [Full Story]


Related Topics:  Chesney, David  Engineering for the Greater Good  

Sep 11, 2014
Jia Deng Wins Best Paper Award at ECCV

Prof. Jia Deng and his collaborators have won the Best Paper Award at ECCV for "Large-Scale Object Classification using Label Relation Graphs." It addresses a computer's ability to accurately classify objects in images, which is a fundamental challenge in computer vision research and an important building block for tasks such as localization, detection, and scene parsing. [Full Story]


Related Topics:  Deng, Jia  Robotics and Computer Vision  

Sep 10, 2014
Theres Really No Delete Button on the Internet

In this interview on Michigan Radio, Prof. Kevin Fu talks about Internet privacy and the fact that boundaries don't really exist in the age of cloud computing. [Full Story]


Related Topics:  Fu, Kevin  Privacy  

Sep 10, 2014
Research finds No Large Scale Heartbleed Exploit Attempts Before Vulnerability Disclosure

Did the NSA or anyone else take advantage of the Heartbleed bug prior to its public disclosure? This Threat Post story describes research by Prof. J. Alex Halderman and others which indicates that traffic data collected on several large networks shows no exploit attempts in the months leading up to the public disclosure. The article has also been slashdotted here. [Full Story]


Related Topics:  Halderman, J. Alex  Privacy  Security (Computing)  

Sep 08, 2014
Kevin Compton Receives ACM-ICPC Coach Award

Prof. Kevin Compton has received an ACM-ICPC Coach Award for his work in five times bringing student programming teams from the University of Michigan to the world finals in the annual ACM International Collegiate Programming Contest. [Full Story]


Related Topics:  Compton, Kevin  Programming  

Sep 08, 2014
Scenes from MHacks IV

They came in droves and built beautiful things. See scenes from MHacks IV, which took place Sept 5-7 in the Beyster, EECS, and Dow Buildings, in this photo album by College of Engineering photographer Joseph Xu. [Full Story]

Sep 08, 2014
Facets of Privacy Discussed at Inauguration Panel

At a symposium to mark the inauguration of President Mark S. Schlissel, leading privacy scholars from U-M and Carnegie Mellon University, including Prof. Kevin Fu, discussed the issues surrounding privacy, social media, and cloud computing. [Full Story]


Related Topics:  Privacy  

Sep 08, 2014
Jetpac: The Implications of the Google Acquisition

In this posting on Dell's Tech Page One site, Prof. Satinder Singh Baveja comments on how the totality of social media posts can, when analyzed on a massive scale, reveal deeply sensitive personal information. Google's recent acquisition of Jetpac wil allow the search engine company to expand its AI capabilities in directions that would potentially allow it to create such user profiles. [Full Story]


Related Topics:  Artificial Intelligence  Baveja, Satinder Singh  Big Data  Machine Learning  

Sep 02, 2014
1,000 Hackers Expected on North Campus for MHacks IV

On the evening of Friday, September 5, about 1,000 student hackers from across the country will arrive for MHacks IV, the premier student-run hackathon. 36 hours of imagination and coding is expected to result in dozens of working projects by Sunday morning. [Full Story]

Aug 26, 2014
Fall 2014: Foundations of Computer Vision

Course No.: EECS 598-008
Credit Hours: 3 credits
Instructor: Jason Corso
Prerequisites: Permission of instructor

Course Description:
Computer Vision seeks to extract useful information from images. This course begins the fundamentals of image formation and then organizes the remaining material according to the class of information to be extracted. The course has been designed to present an introduction to computer vision targeted to graduate students. The course will balance theory and application both in lectures and assignments. [More Info]

Aug 26, 2014
Fall 2014: Practical Machine Learning

Course No.: EECS 598-007
Credit Hours: 3 credits
Instructor: Jenna Wiens
Prerequisites: EECS 445 or EECS 545 or permission of instructor

Course Description:
In this seminar class we will cover the basics of practical machine learning and data mining while focusing on real-world applications. We will read and critique recent applied ML work in the fields of sports analytics, data-driven medicine, finance, and personalized education. At the same time, we will review a complementary set of papers to help guide our discussion in terms of the pragmatic aspects of ML e.g., feature engineering, cross-validation, and performance measures. The overall goal of the class is for students to gain a deeper understanding of the practical challenges and pitfalls associated with applying machine learning tools and techniques in a real-world setting.

Aug 26, 2014
Fall 2014: Probabilistic Analysis of Large Scale Systems

Course No.: EECS 598-006
Credit Hours: 3 credits
Instructor: Vijay Subramanian
Prerequisites: EECS 501 or permission of instructor

Course Description:
This course will focus on emerging topics in epidemics and diffusions, queueing systems, analysis of randomized algorithms, Bayesian information cascades, network analysis and random graphs. [More Info]

Aug 26, 2014
Fall 2014: Laser Plasma Diagnostics

Course No.: EECS 598-005
Credit Hours: 3 credits
Instructor: Louise Willingale
Prerequisites: EECS 537 or permission of instructor

Course Description:
This course will cover the techniques used for creating, characterizing and timing high power laser pulses from megajoule-nanosecond pulses to relativistic-intensity femtosecond pulses. [More Info]

Aug 26, 2014
Tweet Analysis Paints More Accurate Employment Picture Than The US Government Release

As reported in International business Times, U-M researchers including Prof. Michael Cafarella and graduate student Dolan Antenucci have found a quicker and more accurate measure of unemployment in America -- through analysis of Twitter data. [Full Story]


Related Topics:  Big Data  Cafarella, Michael  

Aug 25, 2014
Shared Memory in Mobile Operating Systems Provides Ingress Point for Hackers

Computer science researchers have exposed a shared memory weakness believed to exist in Android, Windows, and iOS operating systems that could be used to obtain personal information from unsuspecting users. The research team has demonstrated how passwords, photos, and other personal information can be stolen while users use popular mainstream apps. [Full Story]


Related Topics:  Mao, Zhuoqing Morley  Security (Computing)  

Aug 22, 2014
Researchers Expose Security Flaws in Backscatter X-ray Scanners

A team of security researchers including Prof. J. Alex Halderman and graduate student Eric Wustrow have discovered several security vulnerabilities in the full-body backscatter X-ray scanners that were deployed to U.S. airports between 2009 and 2013. The researchers were able to slip knives, guns, and other contraband past the systems. [Full Story]


Related Topics:  Halderman, J. Alex  Security (Computing)  

Aug 21, 2014
Researchers Demo Hack to Seize Control of Municipal Traffic Signal Systems

Computer science researchers working with Prof. J. Alex Halderman have demonstrated that a number of security flaws exist in commonly-deployed networked traffic signal systems that leave the systems vulnerable to attack or manipulation. They presented their findings at the 8th USENIX Workshop on Offensive Technologies. [Full Story]


Related Topics:  Halderman, J. Alex  Security (Computing)  

Aug 19, 2014
Researchers Hack Into Michigans Traffic Lights

MIT Technology Review has covered work led by Prof. J. Alex Halderman, in which he and students including Branden Ghena have demonstrated security flaws in a common system of networked traffic signals. [Full Story]


Related Topics:  Halderman, J. Alex  Security (Computing)  

Aug 19, 2014
Two New Faculty Join CSE in Fall 2014

CSE is delighted to welcome two outstanding new faculty members to Michigan. With highly relevant research pursuits in the realms of secure and private Internet-scale services and in machine-learning and data extraction methodologies, they'll help to lead and teach us as we enter a world increasingly shaped by computer science and engineering. [Full Story]


Related Topics:  Big Data  Machine Learning  Madhyastha, Harsha  Security (Computing)  Wiens, Jenna  

Aug 15, 2014
Slashdot: Can Our Computers Continue To Get Smaller and More Powerful?

Prof. Igor Markov's article in this week's issue of the journal Nature, along with the ARS Technica article that provides commentary, have been slashdptted. [Full Story]


Related Topics:  Computer Architecture  Markov, Igor  

Aug 15, 2014
Are processors pushing up against the limits of physics?

ARS Technica has provided a lengthy analysis and commentary on Prof. Igor Markov's article that appeared in the journal Nature regarding the limits of computing. [Full Story]


Related Topics:  Computer Architecture  Markov, Igor  

Aug 14, 2014
The Limits of Moores Law Limits

Following an interview with Prof. Igor Markov, EE Times asks: ...now that we are approaching the atomic scale, many see the handwriting on the wall: When you get down to one atom per memory cell, Moore's Law has to end -- or has it? [Full Story]


Related Topics:  Computer Architecture  Markov, Igor  

Aug 13, 2014
Can Our Computers Continue to Get Smaller and More Powerful?

In an article in this week's issue of the journal Nature, Prof. Igor Markov reviews limiting factors in the development of computing systems to help determine what is achievable, identifying "loose" limits and viable opportunities for advancements through the use of emerging technologies. His research for this project was funded by the National Science Foundation, the Semiconductor Research Corporation, and the Air Force Research Laboratory. [Full Story]


Related Topics:  Computer Architecture  Markov, Igor  

Aug 11, 2014
Vulnerabilities Demonstrated in Traffic Signal Controls

Students in Prof. J. Alex Halderman's recent EECS 588 course, including graduate student Brandon Ghena, have demonstrated vulnerabilities that would allow hackers to take control of municipal traffic light systems. [Full Story]


Related Topics:  Halderman, J. Alex  Security (Computing)  

Aug 08, 2014
Court case: Voting via the Internet is a civil rights issue for disabled

The debate over whether Americans should be permitted to vote via the Internet has long pitted voting system manufacturers, who frame it to election officials as inevitable and modern, against cybersecurity experts including Prof. J. Alex Halderman, who has repeatedly demonstrated vulnerabilities in voting systems worldwide. [Full Story]


Related Topics:  Digital Democracy  Halderman, J. Alex  Security (Computing)  

Aug 05, 2014
Utah is correct to both be at the front of online voting, and cautiously study security

Prof. J. Alex Halderman is watching as the state of Utah convenes a committee to study how the Beehive State might proceed with online voting. [Full Story]


Related Topics:  Digital Democracy  Halderman, J. Alex  Security (Computing)  

Jul 31, 2014
Dragomir Radev Coaches High School Linguists in Competition at International Linguistics Olympiad

Prof. Dragomir Radev has coached North American high school students to a variety of top and highly placed individual and team finishes at the 12th International Linguistics Olympiad (IOL), which was held in Beijing, China from July 21 through 25. It is the eighth year that Prof. Radev has performed this service. [Full Story]


Related Topics:  Computational Linguistics  Diversity and Outreach  Radev, Dragomir  

Jul 25, 2014
2014 Promotions of our Faculty

Congratulations to the following faculty who received promotions this year: Valeria Bertacco, Jason Flinn, Satish Narayanasamy, Edwin Olson, Mina Rais-Zadeh, and Zhaohui Zhong. Keep up the great work! [Full Story]


Related Topics:  Bertacco, Valeria  Flinn, Jason  Narayanasamy, Satish  Olson, Edwin  Rais-Zadeh, Mina  Zhong, Zhaohui  

Jul 18, 2014
Alumni Explore Lots of EECS-related Engineering with Their Kids

Three hundred and eighty alumni and children visited North Campus June 26 and 27 as part of the Xplore Engineering summer camp, with many of the activities related to or hosted by EECS. [Full Story]


Related Topics:  Diversity and Outreach  

Jul 18, 2014
Barzan Mozafari and Collaborators Chosen for Best Demo at ACM SIGMOD

Prof. Barzan Mozafari and his collaborators have received the Best Demo Award at the 2014 ACM SIGMOD/PODS Conference. The demo was of their Analytical Bootstrap (ABS) System, which enables complex exploratory data analysis on large volumes of data. ABS is described in their paper, ABS: a System for Scalable Approximate Queries with Accuracy Guarantees. [Full Story]


Related Topics:  Big Data  Mozafari, Barzan  
All CSE News for 2014

 



Categories


CSE News

News by Topic

News by Faculty

CSE In the News

Research News

Faculty and Staff News

Student News

Course Announcements

Alumni News

Department News

News Archives


2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999